Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailA contribution to Cyber-Security of Networked Control Systems: an Event-based Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in Proceedings of 2017 3rd International Conference on Event-Based Control, Communication and Signal Processing (EBCCSP 2017) (2017, May)

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection ... [more ▼]

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection attacks, is used for controller synthesis. Based on the classical fault tolerant detection (FTD) tools, a residual generator for attack/fault detection based on observers is proposed. An event-triggered and Bilinear Matrix Inequality (BMI) implementation is proposed in order to achieve novel and better security strategy. The purpose in using this implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. It is important to note that the main contribution of this paper is to establish the adequate event-triggered and BMI-based methodology so that the particular structure of the mixed attacked/faulty structure can be re-formulated within the classical FTD paradigm. Experimental results are given to illustrate the developed approach efficiency on a pilot three-tank system. The plant model is presented and the proposed control design is applied to the system. [less ▲]

Detailed reference viewed: 135 (4 UL)
Peer Reviewed
See detailControl Theory and Systems Biology
Goncalves, Jorge UL; Warnick, S.

in Iglesias, P. A.; Ingalls, B. P. (Eds.) Dynamical structure Functions in Network Reconstruction (2009)

Presenting a control-theoretic treatment of stoichiometric systems, ... local parametric sensitivity analysis, the two approaches yield identical results. ...

Detailed reference viewed: 136 (4 UL)
See detailControl theory methods for macro models with stochastic micro foundations
Tonita, R. J.; Goncalves, Jorge UL; Lestas, I. C. et al

Scientific Conference (2008)

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailControllability of transportation networks
Rinaldi, Marco UL

in Transportation Research. Part B, Methodological (2018), 118

Network-wide traffic control policies determine the optimal values for the different kinds of controllers equipped on a transportation network, with the objective of reducing de- lays and congestion ... [more ▼]

Network-wide traffic control policies determine the optimal values for the different kinds of controllers equipped on a transportation network, with the objective of reducing de- lays and congestion, improving safety and reaching a target Level of Service. While models and algorithms for these problems have been extensively studied in literature, little at- tention has been devoted to investigating whether/how different locations, kinds (pricing controllers, traffic lights, ...) and amounts of controllers in a network affect the overall performance of network-wide schemes. In this work, we adapt the control-theoretical approach of controllability of complex networks to the specific instance of transportation networks, considering both propaga- tion/spillback dynamics and users’ behavior in terms of route choice. Thanks to the newly developed methodology, we then provide exact solutions to the Full Controllability Pric- ing Controller Location Problem for transportation networks. Comparing different pricing controller location policies through two artificial test cases, we empirically demonstrate how indeed the amount and kind of controllers in a network strongly affect the level of performance reachable by network-wide control policies, specifically in terms of Total Cost minimization. [less ▲]

Detailed reference viewed: 67 (4 UL)
Full Text
Peer Reviewed
See detailControllability of transportation networks
Rinaldi, Marco UL; Viti, Francesco UL

Scientific Conference (2018, September)

Detailed reference viewed: 64 (0 UL)
Full Text
See detailConventional EO Satellites vs. CubeSats; FDL - AI flood detection onboard a Nano Satellite
Backes, Dietmar UL; Schumann, Guy; Teferle, Felix Norman UL

Scientific Conference (2019, December 11)

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailCoping with turn-taking:Investigating breakdowns in human-robot interaction from a Conversation Analysis (CA) perspective
Arend, Béatrice UL; Sunnen, Patrick UL

in Proceedings: The 8th International Conference on Society and Information Technologies (2017, March)

Detailed reference viewed: 64 (1 UL)
Full Text
Peer Reviewed
See detailCorotational cut finite element method for real-time surgical simulation: Application to needle insertion simulation
Bui, Huu Phuoc UL; Tomar, Satyendra UL; Bordas, Stéphane UL

in Computer Methods in Applied Mechanics and Engineering (2018), 345

We present the corotational cut Finite Element Method (FEM) for real-time surgical simulation. The only requirement of the proposed method is a background mesh, which is not necessarily conforming to the ... [more ▼]

We present the corotational cut Finite Element Method (FEM) for real-time surgical simulation. The only requirement of the proposed method is a background mesh, which is not necessarily conforming to the boundaries/interfaces of the simulated object. The details of the surface, which can be directly obtained from binary images, are taken into account by a multilevel embedding algorithm which is applied to elements of the background mesh that are cut by the surface. Dirichlet boundary conditions can be implicitly imposed on the surface using Lagrange multipliers, whereas traction or Neumann boundary conditions, which is/are applied on parts of the surface, can be distributed to the background nodes using shape functions. The implementation is verified by convergences studies, of the geometry and of numerical solutions, which exhibit optimal rates. To verify the reliability of the method, it is applied to various needle insertion simulations (e.g. for biopsy or brachytherapy) into brain and liver models. The numerical results show that, while retaining the accuracy of the standard FEM, the proposed method can (1) make the discretisation independent from geometric description, (2) avoid the complexity of mesh generation for complex geometries, and (3) provide computational speed suitable for real-time simulations. Thereby, the proposed method is very suitable for patient-specific simulations as it improves the simulation accuracy by automatically, and properly, taking the simulated geometry into account, while keeping the low computational cost. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailCorrect biological timing in Arabidopsis requires multiple light-signaling pathways.
Dalchau, N.; Hubbard, K. E.; Robertson, F. C. et al

in Proceedings of the National Academy of Sciences of the United States of America (2010), 107(29), 13171-13176

Circadian oscillators provide rhythmic temporal cues for a range of biological processes in plants and animals, enabling anticipation of the day/night cycle and enhancing fitness-associated traits. We ... [more ▼]

Circadian oscillators provide rhythmic temporal cues for a range of biological processes in plants and animals, enabling anticipation of the day/night cycle and enhancing fitness-associated traits. We have used engineering models to understand the control principles of a plant's response to seasonal variation. We show that the seasonal changes in the timing of circadian outputs require light regulation via feed-forward loops, combining rapid light-signaling pathways with entrained circadian oscillators. Linear time-invariant models of circadian rhythms were computed for 3,503 circadian-regulated genes and for the concentration of cytosolic-free calcium to quantify the magnitude and timing of regulation by circadian oscillators and light-signaling pathways. Bioinformatic and experimental analysis show that rapid light-induced regulation of circadian outputs is associated with seasonal rephasing of the output rhythm. We identify that external coincidence is required for rephasing of multiple output rhythms, and is therefore important in general phase control in addition to specific photoperiod-dependent processes such as flowering and hypocotyl elongation. Our findings uncover a fundamental design principle of circadian regulation, and identify the importance of rapid light-signaling pathways in temporal control. [less ▲]

Detailed reference viewed: 85 (2 UL)
Full Text
Peer Reviewed
See detailA cost-effective atomic force microscope for undergraduate control laboratories
Jones, C. N.; Goncalves, Jorge UL

in IEEE Transactions on Education (2010), 53(2), 328-334

This paper presents a simple, cost-effective and robust atomic force microscope (AFM), which has been purposely designed and built for use as a teaching aid in undergraduate controls labs. The guiding ... [more ▼]

This paper presents a simple, cost-effective and robust atomic force microscope (AFM), which has been purposely designed and built for use as a teaching aid in undergraduate controls labs. The guiding design principle is to have all components be open and visible to the students, so the inner functioning of the microscope has been made clear to see. All of the parts but one are off the shelf, and assembly time is generally less than two days, which makes the microscope a robust instrument that is readily handled by the students with little chance of damage. While the scanning resolution is nowhere near that of a commercial instrument, it is more than sufficient to take interesting scans of micrometer-scale objects. A survey of students after their having used the AFM resulted in a generally good response, with 80% agreeing that they had a positive learning experience. [less ▲]

Detailed reference viewed: 132 (0 UL)
Full Text
Peer Reviewed
See detailCoupled molecular-dynamics and finite-element-method simulations for the kinetics of particles subjected to field-mediated forces
Cascio, Michele; Baroli, Davide UL; Bordas, Stéphane UL et al

in Physical Review. E ,Statistical, Nonlinear, and Soft Matter Physics (2019), 99(6),

A computational approach that couples molecular-dynamics (MD) and the-finite-element-method (FEM) technique is here proposed for the theoretical study of the dynamics of particles subjected to ... [more ▼]

A computational approach that couples molecular-dynamics (MD) and the-finite-element-method (FEM) technique is here proposed for the theoretical study of the dynamics of particles subjected to electromechanical forces. The system consists of spherical particles (modeled as micrometric rigid bodies with proper densities and dielectric functions) suspended in a colloidal solution, which flows in a microfluidic channel in the presence of a generic nonuniform variable electric field generated by electrodes. The particles are subjected to external forces (e.g., drag or gravity) which satisfy a particlelike formulation that is typical of the MD approach, along with an electromechanical force that, in turn, requires the three-dimensional self-consistent solutions of correct continuum field equations during the integration of the equations of motion. In the MD-FEM method used in this work, the finite element method is applied to solve the continuum field equations while the MD technique is used for the stepwise explicit integration of the equations of motion. Our work shows the potential of coupled MD-FEM simulations for the study of electromechanical particles and opens a double perspective for implementing (a) MD away from the field of atomistic simulations and (b) the continuum-particle approach to cases where the conventional force evaluation used in MD is not applicable. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailCrack growth calculations in solder joints based on microstructural phenomena with X-FEM
Menk, Alexander; Bordas, Stéphane UL

in Computational Materials Science (2011), 50(3), 1145-1156

Determining the lifetime of solder joints subjected to thermomechanical loads is crucial to guarantee the quality of electronic devices. The fatigue process is heavily dependent on the microstructure of ... [more ▼]

Determining the lifetime of solder joints subjected to thermomechanical loads is crucial to guarantee the quality of electronic devices. The fatigue process is heavily dependent on the microstructure of the joints. We present a new methodology to determine the lifetime of the joints based on microstructural phenomena. Random microstructures are generated to capture the statistical variety of possible microstructures and crack growth calculations are performed. The extended finite element method is used to solve the structural problem numerically which allows a complete automation of the process. Numerical examples are given and compared to experimental data. [less ▲]

Detailed reference viewed: 74 (0 UL)
Full Text
Peer Reviewed
See detailCrafting Conversational Agents' Personality in a User-Centric Context
Mano Ferreira, Cátia; Höhn, Sviatlana UL

in Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019) (2019, November)

Detailed reference viewed: 35 (0 UL)
See detailCREATIVITY IN TRANSACTIONAL DESIGN PROBLEMS: NON-INTUITIVE FINDINGS OF AN EXPERT STUDY USING SCAMPER
Moreno Grandas, Diana Paola UL; Yang, Maria C.; Hernandez, Alberto A. et al

in INTERNATIONAL DESIGN CONFERENCE - DESIGN 2014 (2014, May)

Designers are currently facing design problems that are not uniquely related to physical systems but transactional as well. Transactional processes (services) have had a steady growth during the last ... [more ▼]

Designers are currently facing design problems that are not uniquely related to physical systems but transactional as well. Transactional processes (services) have had a steady growth during the last three decades and currently add more than 65% of global economic value. This study expands our understanding of designers’ interaction with ideation methods. We investigate a heuristic method known as SCAMPER, focusing on a transactional design problem with a relatively large transactional domain expert sample size (n=60). The study shows, unexpectedly, that the SCAMPER method appears to be both a fixating and de-fixating method (at least for the type of problem explored), where design fixation is not shown to be effectively mitigated by the method; yet, despite this finding, a significantly higher novelty production is achieved when compared to a non-assisted scenario. [less ▲]

Detailed reference viewed: 62 (4 UL)
Full Text
Peer Reviewed
See detailCross-enterprise value stream assessment
Oberhausen, Christof UL; Plapper, Peter UL

in Journal of Advances in Management Research (2017), 14(2), 182-193

Purpose – In most cases, the conventional assessment of value streams is based on key performance indicators (KPIs) like the share of added value, the degree of flow or a comprehensive lead time analysis ... [more ▼]

Purpose – In most cases, the conventional assessment of value streams is based on key performance indicators (KPIs) like the share of added value, the degree of flow or a comprehensive lead time analysis. To evaluate cross-enterprise value streams of manufacturing, business or service processes in detail, a holistic methodology is needed. The paper aims to discuss this issue. Design/methodology/approach – In this research paper, the assessment of value streams within complex cross-company networks is described. After a presentation of relevant KPIs in the fields of value stream management (VSM) and supply chain management (SCM), an approach for a cross-enterprise evaluation of value streams on different levels of detail is shown. In addition, the use of an absolute VSM evaluation, in contrast to a relative VSM assessment, is examined. Findings – Based on a uniform and well-balanced set of KPIs and other VSM and SCM parameters, a performance assessment on different levels of value stream detail is enabled. Further investigations reveal the advantages of a relative compared with an absolute VSM assessment. Research limitations/implications – In addition to a comprehensive overview of existing KPIs for a value stream assessment beyond company borders, a holistic and multi-level VSM approach is presented in this paper. In contrast to existing VSM approaches, the described method allows an evaluation and subsequent improvement of value streams within supply chain networks. Up to now, the presented approach for the assessment of cross-enterprise value streams has only been tested in specific industrial environments. In future, the proposed methodology shall also be validated for other process types like business, service or further manufacturing processes. Practical implications – The described cross-company performance measurement approach shows a high practical relevance for organizations operating in supply chain networks. Due to the integrated use of different VSM parameters, the evaluation of highly interconnected value streams across corporate boundaries is facilitated. By means of a case study, the proposed methodology is validated under real industry conditions and proves its practical applicability. Originality/value – One of the novel features of this research is the extension of the traditional VSM method with respect to a relative evaluation of value streams based on a set of significant KPIs. In addition, the allocation of these KPIs to different value stream layers and categories leads to an innovative approach for a multi-level assessment according to the needs of the specific VSM application, e.g. a more standardized use of VSM in complex supply chain networks. [less ▲]

Detailed reference viewed: 154 (9 UL)
Full Text
See detailCutting in real time in corotational elasticity and perspectives on simulating cuts
Courtecuisse, H.; Kerfriden, P.; Bordas, Stéphane UL

Book published by Springer (2013)

We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of ... [more ▼]

We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of magnitude smaller than that of the organ. [less ▲]

Detailed reference viewed: 75 (0 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 190 (9 UL)
Full Text
Peer Reviewed
See detailCybermenaces, enjeux et sécurité : entretien avec Stéphane Bortzmeyer et Mohsen Souissi (Afnic)
Schafer, Valerie UL

in Flux: Cahiers Scientifiques Internationaux Réseaux et Territoires (2020), 2019/4

Si les cyberattaques récentes au Moyen-Orient, menées via les noms de domaine, ont eu un vaste écho médiatique fin février 2019, tandis que la revue Défense et Sécurité Internationale consacrait un ... [more ▼]

Si les cyberattaques récentes au Moyen-Orient, menées via les noms de domaine, ont eu un vaste écho médiatique fin février 2019, tandis que la revue Défense et Sécurité Internationale consacrait un dossier spécial à la techno-guérilla, les menaces qui pèsent sur les réseaux informatiques ne sont pas nouvelles. L’Afnic – Association Française pour le Nommage Internet en Coopération –, gestionnaire historique du .fr, fait partie des acteurs français confrontés au quotidien aux enjeux de sécurité des réseaux Internet et veille notamment à la sécurité des noms de domaine et au bon fonctionnement du .fr, en terme de disponibilité mais aussi d’intégrité. Mohsen Souissi, alors Responsable des Sécurité des Sys- tèmes d’information (RSSI) à l’Afnic, qu’il a intégrée en 2000 et où il était précédemment responsable Recherche et développement (R&D) de 2007 à 2016, et Stéphane Bortzmeyer, auteur de Cyberstructure (C&F Éditions, 2018) et ingénieur à l’Afnic depuis seize ans, après avoir été administrateur pour plusieurs systèmes et réseaux universitaires et de centres de recherche, reviennent sur les cybermenaces et les enjeux de sécurité auxquels ils sont confrontés. [less ▲]

Detailed reference viewed: 27 (0 UL)